Sciweavers

1004 search results - page 4 / 201
» Safe Constraint Queries
Sort
View
CCS
2008
ACM
13 years 9 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
DEXAW
2005
IEEE
155views Database» more  DEXAW 2005»
14 years 1 months ago
MediaPeer: A Safe, Scalable P2P Architecture for XML Query Processing
Increasing popularity of XML and P2P networks has generated much interest in distributed processing of XML data. We propose a novel solution organized around a mediator capable of...
Florin Dragan, Georges Gardarin, Laurent Yeh
FC
2010
Springer
183views Cryptology» more  FC 2010»
13 years 11 months ago
Automatically Preparing Safe SQL Queries
We present the first sound program source transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsa...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
CCS
2010
ACM
13 years 6 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
GPCE
2007
Springer
14 years 1 months ago
Simple and safe SQL queries with c++ templates
Most software applications use a relational database for data management and storage. Interaction with such a database is often done by letting the program construct strings with ...
Joseph Gil, Keren Lenz